ThereExist S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)
ForAll S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)
ForAll S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)
ThereExist S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)
1
0
2
Infinitely many
Uniformed-cost search
Depth-first search
Iterative deepening search
Depth-limited search
Hill-climbing search
Simulated annealing search
Genetic algorithm
A* search
. Create a table by combining inquiry results from one table and the ones of the other table
Create a new table by combining tuples satisfying conditions from tuples in more than two tables
Extract the rows satisfying specific conditions from the table
. Extract the specific columns from the table
SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary
SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000
SELECT employee_name FROM human_resource WHERE salary>=300000
SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name
Speak user language
Easy to use
Provide clearly marked exits
. Minimize user memory load
A group of test users conduct a formal experiment
A group of usability experts judge an interface with a detailed checklist of guidelines
a group of psychologists administer a questionnaire
A group of usability experts review a user interface according to a small set of principles
safety
User satisfaction
. efficiency
learnability
safety
User satisfaction
. efficiency
learnability
Experience changes ones perception of the world
Evaluate the performance of the interaction
. Designers believe users always follow illogical paths
Testing the performance under user stress is important
Heuristic evaluation
Rubin’s comparison test
Usability test
Pluralistic walkthrough
It enables high-speed data transmission of differing incoming and outgoing speeds, using the existing telephone line (twisted pair).
Optical fiber cable is laid down to the home to enable various communication services such as telephony, ISDN, and data communications.
Voice and data are sent by time-divided multiplexing.
. Voice and data are separated by a terminal adapter (TA), so they can share the same line.
Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures.
Connects at the data-link layer and has traffic separating function.
Connects at the physical layer and is used to extend the connection distance.
Connects at the network layer and is used for interconnecting LAN systems to wide area network.
SMTP is a protocol for receiving, and POP3 is a protocol for sending.
SMTP is the protocol for the Internet, and POP3 is the protocol for LAN.
The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides to transmit are mail servers.
SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected.
CSMA/CD
ATM
TCP/IP
ISDN
Compare to circuit switching, the latency within the network is short.
Packet switching service is not possible with ISDN.
In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)
. By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line.
110
23
22
443
When privileges are set for a user ID, they should be minimized.
A user having multiple user IDs should set the same password for all the IDs.
When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified.
All the users involved in the same project should use the same user ID.
DIDDDEEPDEERREAM
EDREDDDIARMEEDPE
IDDDEPDEERDEEMRA
. ERDEIDDDEMRAEPDE
Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus infects the boot sectors of other floppy disks.
Since it can be easily determined as to whether a macro function is infected by a virus, infection can be prevented at the time of opening a document file.
A macro virus infects document files opened or newly created after an infected document file is opened.
The execution of an infected application loads in the macro virus into the main memory, and in this process, the virus infects program files of other applications.
To ensure that the user does not forget the password, it is displayed on the terminal at the time of log on.
When there is a request for connection, a callback will be made to a specific telephone number to establish the connection.
. If a password is not modified within a priviously specified period of time, it will no longer be possible to connect using this password.
c. If the password is entered wrongly for a number of times determined in advanced, the line will be disconnected.
The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords.
Even if a password file records encrypted passwords, the department should make it inaccessible to general users.
It it is possible to set the term of validity of passwords, the term should be used for checking password validation.
The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be changed.
Linkage tests
System tests
Operation tests
Regression tes
Codes inevitably vary, so it is important to put code books in order and to manage them.
Numerals should mainly be used as codes, and Chinese characters should not be used.
Codes should be assigned to make data classification easier, but the addition or expansion of codes should not be considered.
. It is desirable that codes are understandable by themselves. Therefore, the use of longer code is better.
It indicates whether functions required for software can always be maintained normally under designated conditions.
It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.
. It indicates how easily operations can be mastered.
It indicates the degree of ease in which modification requests from users or troubles can be handled.
It indicates whether functions required for software can always be maintained normally under designated conditions.
It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.
. It indicates how easily operations can be mastered.
It indicates the degree of ease in which modification requests from users or troubles can be handled.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.